gfe-relnote: n/a. Remove obsolete comment from test. Follow-up to cl/309254981 and cl/309297734. Test is known to work in Chromium since it been enabled with TLS at https://quiche.googlesource.com/quiche.git/+/b5a07a10762d9200b3185ae3e8a3f1038811258e and rolled into Chromium at https://crrev.com/c/2174355. PiperOrigin-RevId: 309398189 Change-Id: I77ad07978a4b1d1f374f30765253543d0ae01fe7
diff --git a/quic/core/http/end_to_end_test.cc b/quic/core/http/end_to_end_test.cc index 37b75c0..4e29da5 100644 --- a/quic/core/http/end_to_end_test.cc +++ b/quic/core/http/end_to_end_test.cc
@@ -1520,8 +1520,6 @@ EXPECT_FALSE(send_alarm->IsSet()); } -// TODO(b/154151800): Needs to get turned back to EndToEndTest when we figure -// out why the test doesn't work on chrome. TEST_P(EndToEndTest, InvalidStream) { ASSERT_TRUE(Initialize()); EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());